Skip to main content

CVE-2025-53112: CWE-284: Improper Access Control in glpi-project glpi

Medium
VulnerabilityCVE-2025-53112cvecve-2025-53112cwe-284cwe-862
Published: Wed Jul 30 2025 (07/30/2025, 14:15:22 UTC)
Source: CVE Database V5
Vendor/Project: glpi-project
Product: glpi

Description

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 9.1.0 through 10.0.18, a lack of permission checks can result in unauthorized removal of some specific resources. This is fixed in version 10.0.19.

AI-Powered Analysis

AILast updated: 07/30/2025, 14:48:30 UTC

Technical Analysis

CVE-2025-53112 is a medium-severity vulnerability affecting the GLPI software, an open-source IT asset and service management tool widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability exists in versions 9.1.0 through 10.0.18 of GLPI and is caused by improper access control (CWE-284) and insufficient authorization checks (CWE-862). Specifically, the flaw allows users with limited privileges (requiring at least some level of authentication) to remove certain specific resources without proper permission verification. This unauthorized removal could lead to integrity issues within the system, as critical assets or configurations might be deleted by users who should not have such rights. The vulnerability does not impact confidentiality or availability directly, nor does it require user interaction beyond authentication. The CVSS 3.1 base score is 4.3, reflecting a network attack vector with low complexity and requiring privileges but no user interaction, resulting in integrity loss only. The issue was publicly disclosed on July 30, 2025, and fixed in GLPI version 10.0.19. No known exploits are currently reported in the wild. The vulnerability highlights the importance of strict permission checks in IT management platforms that handle sensitive asset and configuration data.

Potential Impact

For European organizations, the impact of this vulnerability can be significant depending on their reliance on GLPI for IT asset management and service desk operations. Unauthorized removal of resources could disrupt IT service management workflows, cause loss or corruption of asset tracking data, and potentially lead to mismanagement of licenses or software audits. This can degrade operational efficiency and increase risk exposure due to inaccurate asset inventories. While the vulnerability does not directly expose sensitive data or cause system downtime, the integrity compromise could indirectly affect compliance with regulatory frameworks such as GDPR if asset or license records are altered or deleted improperly. Organizations with complex IT environments or those managing critical infrastructure may face increased operational risks. The lack of known exploits reduces immediate threat but does not eliminate the risk of targeted attacks exploiting this flaw.

Mitigation Recommendations

European organizations using GLPI should promptly upgrade to version 10.0.19 or later, where this vulnerability is fixed. Until the upgrade is applied, administrators should review and tighten user permissions, ensuring that only trusted and necessary users have rights to remove resources. Implementing strict role-based access control (RBAC) policies and regularly auditing permission assignments can reduce the risk of unauthorized actions. Additionally, monitoring logs for unusual deletion activities and enabling alerting on such events can provide early detection of exploitation attempts. Organizations should also consider isolating GLPI instances within secure network segments and enforcing multi-factor authentication (MFA) for administrative access to further reduce risk. Regular backups of GLPI data should be maintained to enable recovery in case of unauthorized deletions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-25T13:41:23.087Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688a2d10ad5a09ad00a699ae

Added to database: 7/30/2025, 2:32:48 PM

Last enriched: 7/30/2025, 2:48:30 PM

Last updated: 7/31/2025, 12:34:31 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats